Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13689: CWE-94 Improper Control of Generation of Code ('Code Injection') in undsgn Uncode Core

0
Medium
VulnerabilityCVE-2024-13689cvecve-2024-13689cwe-94
Published: Tue Feb 18 2025 (02/18/2025, 14:22:15 UTC)
Source: CVE Database V5
Vendor/Project: undsgn
Product: Uncode Core

Description

CVE-2024-13689 is a medium-severity vulnerability in the Uncode Core WordPress plugin allowing authenticated users with Subscriber-level access or higher to execute arbitrary shortcodes. The flaw arises from improper validation before calling do_shortcode, enabling code injection via shortcode execution. Exploitation does not require user interaction and can impact confidentiality, integrity, and availability of affected WordPress sites. No known exploits are currently reported in the wild. Organizations using the Uncode Core plugin up to version 2. 9. 1. 6 should prioritize patching or applying mitigations to prevent potential abuse. The vulnerability affects all versions up to and including 2. 9.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:47:16 UTC

Technical Analysis

The vulnerability identified as CVE-2024-13689 affects the Uncode Core plugin for WordPress, versions up to and including 2.9.1.6. It is classified under CWE-94, indicating improper control of code generation, specifically code injection. The issue stems from the plugin allowing authenticated users with Subscriber-level access or higher to execute arbitrary shortcodes without proper validation before invoking the WordPress function do_shortcode. This function processes shortcodes, which can embed dynamic content or code execution within WordPress posts or pages. Because the input is not properly sanitized or validated, attackers can craft malicious shortcodes that execute arbitrary code within the context of the WordPress site. The vulnerability requires authentication but no additional user interaction, making it easier to exploit by any user who can log in with at least Subscriber privileges. The CVSS 3.1 base score of 6.3 reflects a medium severity, with network attack vector, low attack complexity, and privileges required. The impact includes potential unauthorized disclosure of information, modification of site content or configuration, and disruption of availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to websites using this plugin. Since the Uncode Core plugin is widely used in WordPress themes for design and layout, many websites could be affected if they have not updated or mitigated this issue. The vulnerability highlights the risk of insufficient input validation in plugin code that handles dynamic content execution.

Potential Impact

The exploitation of CVE-2024-13689 can lead to unauthorized execution of arbitrary shortcodes, which may allow attackers to perform actions such as data leakage, content manipulation, privilege escalation, or denial of service. Since the vulnerability requires only Subscriber-level access, attackers can leverage compromised or low-privilege accounts to escalate their control over the WordPress site. This can result in defacement, injection of malicious content (e.g., malware distribution), or disruption of site availability. For organizations, this can lead to reputational damage, loss of customer trust, and potential regulatory penalties if sensitive data is exposed. The medium severity score indicates a significant but not critical risk; however, the widespread use of WordPress and the Uncode Core plugin increases the potential attack surface globally. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once details are public. Organizations relying on this plugin should consider the vulnerability a priority for remediation to prevent exploitation.

Mitigation Recommendations

1. Immediately restrict or review user roles and permissions to ensure that only trusted users have Subscriber-level or higher access, minimizing the risk of exploitation. 2. Disable shortcode execution for untrusted user inputs or contexts where possible, especially from low-privilege users. 3. Monitor logs and audit trails for unusual shortcode usage or unexpected shortcode execution patterns. 4. Apply principle of least privilege for all WordPress user accounts and enforce strong authentication mechanisms. 5. Keep the Uncode Core plugin updated; monitor vendor announcements for patches or security updates addressing this vulnerability. 6. If a patch is not yet available, consider temporarily disabling the Uncode Core plugin or replacing it with alternative solutions until a fix is released. 7. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious shortcode execution attempts. 8. Conduct regular security assessments and penetration testing focusing on plugin vulnerabilities and shortcode injection risks. 9. Educate site administrators and developers about the risks of shortcode injection and secure coding practices to prevent similar issues in custom plugins or themes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T19:05:17.334Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e68b7ef31ef0b5a017c

Added to database: 2/25/2026, 9:49:28 PM

Last enriched: 2/25/2026, 10:47:16 PM

Last updated: 2/26/2026, 7:11:41 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats